The original post: /r/cybersecurity by /u/WhenTheRainsCome on 2024-11-07 20:37:58.
I’m updating my understanding and ability to communicate to non-technical folks on WHY hardware keys improve security. There are some classic scenarios like, you can’t read your FIDO2 auth over the phone in a social engineering scenario like you can with an OTP.
I’d like to showcase how phishing-resistant MFA protects against an Attacker in the Middle scenario.
I don’t operate a PhaaS platform, so I’m missing some of the tech details from the TA perspective, how far off base are the scenarios I diagrammed out?
You must log in or register to comment.